The FDA issued an official FDA guidance on the management of Postmarket Cybersecurity in 2016. This guidance provides recommendations for medical device manufacturers, many of which are not yet widely adopted. From Coordinated Disclosure, to ISAOs, this post will attempt to summarize the guidance.
In the last few years, researchers have proven that thousands of hospitals and labs are in possession of medical devices that are vulnerable to hacking. This has largely been due to the rising number of medical devices connected to the internet and, unlike sectors dealing with money (banks, investing, etc.), a lackadaisical attitude towards the cyber risk. Some medical devices were deployed with fixed passwords, or factory defaults that were never changed. From infusion pumps to CT scanners, many proved accessible by anyone within the hospital network, or sometimes, on the web.
Below is a well known “word cloud” of default passwords to medical devices. To provide serviceability, the user manuals recommended their users not change the default password. Consequently, thousands of devices were on networks, with authentication using default passwords shown below. These passwords were not secret or hidden, but were publicly available in the manuals:
Below are some of the more recent cyber-related incidents for medical device cybersecurity:
To date, no one is known to have been injured due to cybersecurity vulnerabilities in medical devices. But obviously, without addressing the risk, it is a ticking time bomb.
In early 2013, President Obama recognized that cyber threats to national security were among the most serious, and that secure and resilient infrastructure was essential. Through executive order and policy directive, the Federal Government was asked to strengthen the infrastructure against cyber threats to critical infrastructure, including the public health sector. The FDA subsequently released a premarket guidance and, more recently, a Postmarket Cybersecurity Guidance for Medical Devices in 2016.
The FDA recognizes that an effective cybersecurity program needs to incorporate proactive postmarket vigilance, and the management is the responsibility of the device manufacturer. Below are the identified critical program components:
A coordinated vulnerability disclosure program provides a method by which vulnerabilities can be reported to the manufacturer and subsequently handled. It needs to provide the methodology by which anyone who finds a vulnerability can report it. For example, if a researcher discovers a vulnerability, how do they report it to the manufacturer and get them to notice it? A coordinated disclosure policy includes publicly available reporting instructions, and describes how that input is handled, and how the risk will be controlled.
Why have a Coordinated Disclosure Program (besides that the FDA says to)?
As part of the federal acknowledgement of the cybersecurity threat, EO 13691 promotes private sector ISAOs to serve as focal points for cybersecurity information sharing and collaboration. The FDA considers participation by manufacturers as critical, and has provided several benefits to those who are members. For example, if a vulnerability is found, the manufacturer must report it to the FDA UNLESS all three of the below conditions apply:
ISAOs protect the privacy of individual members and preserve business confidentiality, safeguarding information being shared.
Our cybersecurity experts can help you! Postmarket Cybersecurity services, including help with a Coordinated Disclosure Program, and ISAO membership are part of our offerings. Our cybersecurity experts can help you!